ZyXEL Communications P-334WHD User Manual
Page 25

P-334WHD User’s Guide
25
Table 80 View Logs ............................................................................................................ 192
Table 81 Log Settings ......................................................................................................... 193
Table 82 Maintenance Firmware Upload ............................................................................ 195
Table 83 Maintenance Restore Configuration .................................................................... 197
Table 84 Config Mode: Advanced Screens ........................................................................ 201
Table 85 Troubleshooting Starting Up Your ZyXEL Device ................................................ 203
Table 86 Troubleshooting the LAN ..................................................................................... 203
Table 87 Troubleshooting the WAN .................................................................................... 204
Table 88 Troubleshooting Accessing the ZyXEL Device .................................................... 205
Table 89 Troubleshooting Restricted Web Pages and Keyword Blocking .......................... 205
Table 90 Troubleshooting the Password ............................................................................ 206
Table 91 Troubleshooting Telnet ........................................................................................ 206
Table 92 Hardware Specifications ...................................................................................... 217
Table 93 Firmware Specifications ....................................................................................... 217
Table 94 Classes of IP Addresses ..................................................................................... 238
Table 95 Allowed IP Address Range By Class ................................................................... 238
Table 96 “Natural” Masks .................................................................................................. 239
Table 97 Alternative Subnet Mask Notation ....................................................................... 239
Table 98 Two Subnets Example ......................................................................................... 240
Table 99 Subnet 1 .............................................................................................................. 240
Table 100 Subnet 2 ............................................................................................................ 241
Table 101 Subnet 1 ............................................................................................................ 241
Table 102 Subnet 2 ............................................................................................................ 242
Table 103 Subnet 3 ............................................................................................................ 242
Table 104 Subnet 4 ............................................................................................................ 242
Table 105 Eight Subnets .................................................................................................... 243
Table 106 Class C Subnet Planning ................................................................................... 243
Table 107 Class B Subnet Planning ................................................................................... 244
Table 108 IEEE 802.11g ..................................................................................................... 249
Table 109 Wireless Security Levels ................................................................................... 250
Table 110 Comparison of EAP Authentication Types ......................................................... 253
Table 111 Wireless Security Relational Matrix .................................................................... 257
Table 112 System Maintenance Logs ................................................................................ 261
Table 113 System Error Logs ............................................................................................. 262
Table 114 Access Control Logs .......................................................................................... 262
Table 115 TCP Reset Logs ................................................................................................ 262
Table 116 Packet Filter Logs .............................................................................................. 263
Table 117 ICMP Logs ......................................................................................................... 263
Table 118 CDR Logs .......................................................................................................... 264
Table 119 PPP Logs ........................................................................................................... 264
Table 120 UPnP Logs ........................................................................................................ 264
Table 121 Content Filtering Logs ....................................................................................... 265
Table 122 Attack Logs ........................................................................................................ 265